E-Sign Transactions Platform: The Enterprise Architecture to Implement Electronic Transactions Requiring Electronic Signatures White Paper

Size: px
Start display at page:

Download "E-Sign Transactions Platform: The Enterprise Architecture to Implement Electronic Transactions Requiring Electronic Signatures White Paper"

Transcription

1 E-Sign Transactions Platform: The Enterprise Architecture to Implement Electronic Transactions Requiring Electronic Signatures White Paper

2 INTRODUCTION More than ever enterprises want to completely automate their business processes. The challenge of digitizing paper-based signature processes is the final obstacle in their quest for a paperless real-time enterprise. As the legal and cultural barriers crumble, enterprises are warming up to the concept of legally binding electronic signatures. Primarily, enterprises have identified e-signatures as a mechanism to eliminate the inefficiencies and expense of paper-based transactions. Enterprise IT staff members are beginning to address the technical challenges needed to complete business process automation. This white paper will aid enterprise architects and business managers in understanding the requirements and the optimal architectural approach to bridge the gap to complete the automation of business processes. We will: 1. Outline a framework that identifies the security, legal, and automation requirements for the E-Sign Transactions Platform. 2. Compare two feasible architectural approaches. 3. Recommend the enterprise architecture to implement electronic transactions requiring electronic signatures. EXECUTIVE SUMMARY Enterprises are faced with the challenge of automating business processes that require digitization of paper-based signature processes. As enterprises continue the migration of higher risk paper-based transactions to the digital world, they are faced with four key questions: 1. How do they ensure that transactions have end-to-end security? 2. Are transactions in the digital world legally enforceable in the court of law? 3. Are signed electronic transactions capable of being intelligently processed by business applications? 4. Will end users accept the transition to electronic signatures? There are two feasible architectures to implement digitization of paper-based signature processes: A document-centric architecture and transaction-centric architecture. The document-centric architecture takes manual processes and moves them to the digital world rather than engineering the processes for further efficiency. This approach is tied very closely to the presentation application and is better suited for content publishing than application processing. In contrast, the transaction-centric architecture enables efficient and effective content processing by understanding data semantics. This aspect of the architecture enables enforcement of sophisticated enterprise policies without disrupting existing business applications. This approach implements a single framework that supports multiple presentation formats. When comparing these two architectural approaches the following observations can be made: The transaction centric architecture enhances the existing IT infrastructure by adding electronic signature capabilities to enable enforceable trusted transactions. The document-centric approach allows departments to build one-off solutions that are application-specific and that cannot be leveraged by enterprise business applications. As the document centric approach mimics the paper processes it is easy to implement a proof-of-concept. Business transactions that require authorization by their very nature are dynamic and require multiple interactions before the transaction is processed. The transaction-centric architecture supports data field level security, privacy and routing rules enforcement, reducing the business risk of migrating to an electronic medium. The document-centric architecture is well suited for one-way communication where content needs to be published and trusted by recipients. The transaction centric architecture allows signed data and its presentation to be cryptographically linked together. This ensures data integrity and enables trusted data exchange between enterprises. On the other hand, the document centric architecture will force enterprises to adopt a proprietary/application specific presentation and data format. The transaction centric architecture becomes part of the IT infrastructure, which allows enterprises to enforce their security, compliance and privacy policies independent of individual business applications. The document centric architecture will require investments in business applications to support these requirements. Conclusion The transaction centric architecture is a flexible architecture that scales from departmental E-Sign Transactions Platform Page 2

3 solutions to enterprise implementations while satisfying the security, compliance, and intelligence needs of different transaction categories. The document centric architecture is not scalable for enterprise solutions and is appropriate only for departmental systems implementing a point solution. BACKGROUND Benefits of Going Digital When Johann Gutenberg invented the printing press in 1436 he sparked a communications revolution. That revolution is still going through a transition unlike any that humans have ever experienced, and with far-reaching consequences. With the advent of the Internet the same revolution has made communication faster, cheaper, and more accessible. Enterprises continue to find ways to move paperbased processes to the digital world in order to take advantage of the inherent benefits. Paper is still the most abundant office supply in today's enterprises. Despite an unwavering resolve to migrate business transactions to the digital world, organizations have had limited success. In order for enterprises to remain competitive in the 21st century, real-time business is paramount. There are well-known benefits of going digital, which include: Increased customer convenience Process Optimization Better security Compliance with regulatory mandates Migration from the paper world allows integration with current electronic processes. The ability to move processes online allows organizations to perform business in real-time while ensuring that information flows are timely, accurate, secure, and validated. According to IDC, a company of 1000 people spends about 81,700 person hours each year moving paper documents, including 1 million faxes, 9 million pages printed, and 4 million pages copied. Enterprises clearly understand the benefits of enabling paperless transactions. However, there are cultural and legal barriers, along with technical challenges that need to be addressed before a solution is deployed. Enterprises require solutions that mitigate business risk while being cost effective. Enterprises typically classify business transactions based on business risk and processing complexity to identify cost effective solutions. For example, it is not cost effective to require the highest-level security solution for a low risk business transaction. A Framework to Define Enterprise Needs We will establish a framework that classifies business transactions. This will help us identify the features of a cost effective solution. More importantly, we will outline the different security, compliance and intelligence requirements of the solution needed to mitigate business risk. Enterprises are beginning to reap the benefits of migrating lower risk paperbased transactions. Figure 1 Summary of Transaction Classes CLASS SECURITY COMPLIANCE INTELLIGENCE Class I No Risk Authentication: None Authorization: None Confidentiality: None Signature: None Audit: None Integrity: None Integration: None Workflow: None Portablility: None Class II Low Risk Authentication: Weak Authorization: Weak Confidentiality: Data in Transit Signature: Click-thru Audit: Jounral Integrity: None Integration: None Workflow: None Portablility: None Class III Medium Risk Authentication: Strong Authorization: Strong Confidentiality: Data at Rest Signature: Ceremony Audit: Jounral Integrity: Weak Integration: Needed Workflow: Needed Portablility: None Class IV High Risk Authentication: Extremely Stong Authorization: Strong Confidentiality: Data Element Level Signature: Ceremony Audit: Tamper Proof Integrity: Guaranteed Integration: Needed Workflow: Needed Portablility: Needed E-Sign Transactions Platform Page 3

4 Unfortunately, enterprises are having limited success when they attempt to migrate higher risk transactions to the digital world. This framework enables organizations to map out an enterprise solution, while meeting today's departmental needs. The following are the four classes of transactions (Figure 1): Class I Transactions Class I transactions are those that have no risk and are low in complexity. Examples of these transactions include downloading of white papers or product fact sheets from an organization's web site. Another example is Government agencies disseminating information on the web such as current regulations. Enterprises typically collect information from people to provide access to these documents. This data is used to trigger a follow-up action rather than to verify authorization. Data that is collected cannot be authenticated. These types of transactions do not require any authentication, and thus cannot support any authorization or confidentiality policy. In addition, these types of transactions usually do not require compliance or intelligence attributes that must be considered. Enterprises are quick to migrate Class I paper-based transactions to the digital world because they represent an opportunity to collect information from potential customers. Class II Transactions Class II transactions are low risk transactions. These transactions require authentication and are typically based on user-id and password or Personnel Identification Number (PIN). In addition, these types of transactions protect (encrypt) data transmission. They require some type of acknowledgement such as a clicking on an I Agree button. These are called click-thru signatures. Enterprises maintain an audit journal of record of these types of transactions. Integration with backend systems is a nice to have for Class II transactions. Software licensing agreements are a good example of Class II transactions, and the click-thru signifies acceptance of the terms. Other Class II transactions include on-line banking systems that allow you to look at your statements and even do your bill payments are another example of Class II transactions. Class III Transactions Class III transactions such as purchase order approvals or regulatory filings require stronger authentication and authorization as well as confidentiality of data in databases. For example, enterprises typically enforce financial spending limits due to an organizational hierarchy that mandates multiple levels of approvals. These transactions follow a prescribed authorization process where people understand the intent of their actions implicitly or explicitly. The electronic counterpart of this transaction has to ensure that the intent of the Figure 2 An Example of Types of Authenticication Biometrics with PKI COMPLEXITY PKI/Digital Signature PIN/Password None CLASS I CLASS II CLASS III CLASS IV Regulatory Guidlines Account Summary Regulatory Filing Wire Transfer RISK EXAMPLES OF TRANSACTIONS E-Sign Transactions Platform Page 4

5 action is clear before a commitment of an action. To avoid accidental actions the signing action will require input from the user beyond a mere 'clickthru'. In addition, enterprises will need to maintain a journal or record of all the transactions that are executed. There is need to support multiple signatures in a defined process environment. In general, these transactions will need to be integrated into back-end enterprise resource planning or financial planning and control systems. Class IV Transactions Class IV transactions have the most stringent requirements for security, compliance, and intelligence. Enterprises have the greatest difficulty in migrating these transactions to the digital world due to their inherent risk. Wire transfers or the redemption of funds from an existing account are good examples of Class IV transactions. Today these business transactions are performed in a trusted environment such as a bank branch office. In addition, the bank officer might verify the identity of the person before completing the transaction. The electronic counterparts will require extremely strong authentication, such as public key cryptography (PKI) and/or biometrics to mitigate identity risk. In addition, the onus is on the enterprise to prove the absence of tampering after the transaction was processed. Sophisticated authorization based on transaction context will be required. Class IV transactions must be able to address the: who, what, where and when of the transaction. It is necessary to have a tamper proof audit trail of these transactions. Tamper proof audit trails ensure that at any time an enterprise can determine who had access to what data, how it was accessed, and how it was used. Tamper proof audit trails must be able to track access at a high level of granularity-data element level security is preferred. Similar to Class III, these transactions need to support multiple signatures in a defined process environment. Transaction transportability, in addition to back-end systems integration, is a requirement as well (Figure 2). Perceived Barriers Enterprises perceive there are cultural and legal barriers that prevent migrating higher risk paperbased transactions to the digital world. Cultural Barriers Perceived cultural barriers have inhibited the adoption of electronic signatures. These include adapting business processes to accommodate a new kind of signature, and the acceptance of digital technology in general. The requirement for handwritten original signatures is often the biggest delay in paper-based transactions, yet enterprises around the world continue to conduct business in this manner. Customers have become more comfortable with electronic transactions with the advent of the Internet. The velocity with which cultural barriers are breaking down is evident through the progress made by e-tailer Amazon.com, which in less than five years has grown bigger than brick and mortar retailer Sears. Consumers are also becoming accustomed to self-service in supermarkets and retail stores throughout the country. At Wal-Mart consumers get out of the store faster through the self-service checkout by signing on electronic signature pads. Users are becoming comfortable with transacting in the digital world, whether it's through self-service checkout lines at a brick and mortar store like Wal- Mart or the cyber world that Amazon.com occupies. Cultural barriers are dissolving as consumers recognize that electronic signatures are the path to fast, convenient, and secure electronic transactions. Legal Barriers Since electronic transactions are not yet supported by centuries of legal precedent, organizations fear the inability to legally enforce them in a court of law. This is exacerbated, as the digital world knows no boundaries. The global nature of electronic commerce brings into question the legal enforceability of transactions from one nation state to another. As governments around the world recognize electronic signatures, we are seeing legal barriers toppling on a global scale. The U.S. Congress passed the Electronic Signatures in Global and National Commerce Act (ESIGN) in June The primary intent of the law is to spur e-commerce and e-government by clearing legal barriers to electronically signed transactions. A key provision of the act is, "with respect to any transaction in or affecting interstate or foreign commerce," a E-Sign Transactions Platform Page 5

6 signature may not be denied legal standing "solely because it is in electronic form." The Federal Government Paperwork Elimination Act (GPEA) also encourages the use of electronic signatures. Various countries including Australia, Canada, China, Singapore, India and those in the European Union have also passed legislation recognizing the legality of electronic signatures. Historically, legal uncertainty about the enforceability of an electronic signature in a court of law was cited as a major barrier to many enterprise automation projects. Today these barriers are falling as a result of legal precedent and governmental regulations. Technical Challenges Inhibiting Migration of Higher Risk Transactions It is evident that the resistance to migration of highrisk paper transactions to electronic transactions is not primarily due to legal or cultural barriers. Indeed the reluctance of enterprises to digitize high-risk paper transactions can be attributed to solution architectures lacking: 1. Comprehensive Security 2. Compliance with legal requirements 3. Ability to meet the enterprise intelligence needs This section will outline the key technical requirements needed to enable migration of high-risk paper transactions to electronic transactions: Comprehensive Security The architecture needs to address the following security requirements: a)uniquely identifying the user: It must be possible to uniquely and unambiguously identify users who perform specific activities within the scope of a business transaction. Users must be issued unique identities and the application must authenticate users so as to associate them with their unique digital identity. b) Linking an activity performed on a business transaction to the user: An activity performed during a business transaction must be related to the user in an unambiguous fashion. c) Ensuring that access is restricted: The system must verify that the authenticated user has appropriate privileges to access the electronic transaction. Compliance with Legal Requirements a) Ensuring that the user is provided with appropriate information to understand the intent of the signature: The user must be made aware of the intent and significance of the electronic signature that binds the user to the specific activity the user is performing. b) Verifying a user's signature and recording the verification responses: To ensure that a user's signature has not been tampered with and to make sure that the signer's credentials are valid, it is necessary to verify the signature and validate the user's credentials. For enforceability, it is necessary to record the signature verification details. c) Keeping records of all activities and providing evidence of the activities when needed: For enforceability of a business transaction, the system must record all actions. The record itself must be protected from tampering. The system must provide tools to produce evidence of these actions in the future. Ability to Meet the Enterprise Intelligence Needs The architecture should leverage existing enterprise IT investments, while delivering a flexible yet strong security solution: a)rule based system to support varied enterprise processes: The electronic process must initially mimic the paper-based workflow process for quick adoption. At the same time, the system must provide tools to re-engineer the workflow processes, as well as define and enforce organizational rules to manage transaction risk. b)intuitive User Interface: Moving from a paper-based process to an electronic one can be daunting for some end users. For successful adoption, the solution must use familiar interfaces such as a web browser and support both Hyper Text Markup Language (HTML) and Adobe Portable Document Format (PDF) presentation formats. In addition, the system should support E-Sign Transactions Platform Page 6

7 electronic pad technology to ease migration from handwritten signatures to electronic signatures. c)easy to integrate with existing applications: Enterprises have invested heavily in their core enterprise architecture and require solutions that will easily integrate with existing applications. Organizations should be able to leverage their existing IT investments such as directory services, PKI, workflow and document management systems. TWO FEASIBLE ARCHITECTURAL APPROACHES There are two architectural approaches for migrating paper-based business processes to the digital world: the document-centric architecture and the transaction-centric architecture. Document-Centric Architecture Overview The focus of the document-centric architecture is on content creation and presentation. The document-centric approach tightly couples the presentation with the data. The basis of this approach is a self-contained document making it ideal for secure content presentation. The term Self-contained document implies the presentation is tied to a particular presentation application. An overview of the architecture is provided in Figure 3. Whenever electronic signatures are required the entire document is cryptographically sealed. Recipients of the document can verify signatures affixed by the sender. At the same time, if the recipients need to add data to the document, they have to create a different version of the document and sign the entire document. This is required because changing the original document will Figure 3 Document Centric Architecture TRANSACTION PROCESSING SYSTEMS GRAPHICAL USER INTERFACE HR SYSTEMS AUDIT HTML PAGE FINANCE SYSTEMS AUDIT ADOBE PDF CALL CENTER SYSTEMS AUDIT MS WORD Processing Presentation Audit APPLICATION LAYER Signature Ceremony Signature Signed Receipt PRESENTATION LAYER Figure 4 Transaction Centric Architecture TRANSACTION PROCESSING SYSTEMS TRUSTED TRANSACTION ENGINES GRAPHICAL USER INTERFACE HR SYSTEMS FINANCE SYSTEMS CALL CENTER SYSTEMS Processing APPLICATION LAYER RULES EVALUATION DATA PRESENTATION SIGNATURE VERIFICATION RULES VALIDATION AUDIT (DATA + PRESENTATION) ROUTING NOTIFICATIONS INFRASTRUCTURE DATA + HTML PAGE DATA + ADOBE PDF DATA + INFOPATH PAGE Signature Ceremony User Signature Signed Receipt PRESENTATION LAYER E-Sign Transactions Platform Page 7

8 invalidate the sender's signature. In addition, the business application needs to be enhanced to integrate the document presentation software and to implement new security rules. More importantly, each application has to build a secure audit function. Typically this is the first step that enterprises take when they decide to implement an electronic signature solution. As the document centric approach mimics the paper world it eases the adoption and acceptance of electronic signatures. Transaction-Centric Architecture Overview The focus of the transaction-centric architecture is on content processing based on enterprise business policy. The basis of the transaction-centric approach is the separation of data from presentation, and understanding of data semantics that enables definition and enforcement of enterprise business policies. An overview of this architecture is presented in Figure 4. The transaction-centric architecture is presentation agnostic allowing a choice of presentation formats. The transaction schema is provided to the 'Transaction Engines' enabling security, compliance and intelligence rule definition. The architecture allows enterprises to define data field level security and compliance rules. For example, restricting access to data elements rather than the entire transaction. The application passes the transaction data to the Transaction Engines at run-time. The Transaction Engines enforce the security, compliance and intelligence rules defined previously. Electronic signatures are implemented by cryptographically sealing individual data elements linked with the presentation template. This approach ensures that adding data to a transaction after it has been signed does not invalidate the electronic signature(s). The transaction-centric approach supports n-tier architecture. In addition, because the 'Transaction Engines' are an extension of the enterprise infrastructure they can enforce enterprise business policies across all applications. EVALUATION CRITERIA The objective of this section is to better define the key requirements identified in the section Technical Challenges in order to compare the two architectural approaches. As previously outlined, the primary requirements are: 1. Comprehensive security 2. Compliance with the legal requirements 3. Ability to meet the enterprise intelligence needs Let us examine in depth each of the fundamental requirements: Comprehensive Security Enterprise security requirements can be broadly categorized as follows: Risk Mitigation Independent of Business Applications Enterprises will either enable existing applications or build new applications to digitize paper-based transactions. The new electronic transactions have a higher risk profile. The primary risk is the electronic identity assurance of the entity that is transacting. Enterprises can improve the appropriate level of assurance they need by using multiple factors of authentication: (a) what you know (b) what you have and (c) who you are. At the same time, enterprises recognize that always requiring a three-factor authentication is not a cost effective solution. Enterprises will have to define new security rules for these new types of transactions. To make it an effective solution, rules implementation should be centrally administered as well as not require changes to existing applications. For example, a simple rule for a bank could be as follows: 'If it is a wire transfer, a PKI credential is required. If it is account opening, a 3rd party credit check is required. Preserve Integrity While Data is Augmented Even a simple business transaction such as approval of a vacation request requires multiple signatures. These signatures have different functions and are generally performed in the context of an organizational workflow that defines roles and responsibilities. In the paper world, each signatory only signs their data, and effectively vouches for the integrity of their data. People can change or add information to the document as long as the original signature is not compromised. The solution should meet the requirement of multiple valid electronic signatures on the same document. More importantly, E-Sign Transactions Platform Page 8

9 the document integrity cannot be compromised while the document is being changed in a workflow, and additional signatures are added Data-Field Level Privacy The law requires many enterprises to protect certain sensitive elements of a document from its various recipients. For example, in an e-commerce transaction, a 'web' merchant does not need to know a credit card number. The merchant only needs to know that the issuing bank has authorized the transaction. This type of requirement is usually met by encrypting the sensitive data; so only authorized recipients can decrypt it. Compliance with the Legal Requirements In the United States, the solution should be compliant not only with E-Sign, but also the UETA law passed by many states. The primary requirements are: Obtain consent if it is a customer-facing transaction Ensure that the end-user understands the intent of signing the transaction The signature should be unique The signature must be under the sole control of the signer The signature should be verifiable The signature should link the document and the signature, such that tampering can be detected Most of these requirements are addressed by a combination of authentication and cryptographic techniques. For example: A user-id/password can be unique, Creating a cryptographic hash on a document ensures integrity Digital signature can be verified Ability to Meet the Enterprise 'Intelligence' Needs: Today enterprises must deal with multiple external entities and support various business units. As a result enterprises require an intelligent IT architecture to mitigate their business risk. We will look at the primary requirements in this area: Single Framework Supporting Multiple Presentation Formats Enterprise applications typically support different delivery channels and thus have to support different presentation formats. The solution should offer a platform that supports multiple formats easily. For example, a financial services organization will need to support an HTML format for on-line banking transactions, an off-line MS/Windows GUI to support field sales and an Adobe PDF Form for retail financial center processing. Content Based Rules Enterprises process the same transaction type differently based on the value of the transaction. For example, a financial services organization will require a signature to be notarized if the amount of withdrawal exceeds $10,000. The solution should provide a framework where such rules can be implemented and if necessary tied to the risk mitigation rules mentioned above. The wire transfer rule could be as follows: 'If it is a wire transfer of more than $10,000, then an electronic notary in addition to a PKI credential is required, otherwise a PKI credential is sufficient. End-to-End Integration Enterprises want to integrate trusted transactions with their existing business applications. These business applications could be legacy applications or commercial off-the shelf (COTS) applications that cannot be modified. The solution should at a minimum support a standards based message format along with a loosely coupled integration model. An optimal solution would have adapters for standard middleware platforms such as IBM/MQ or WebMethods. Trusted Data Exchange Between Enterprises Certain business transactions will need to cross enterprise boundaries. For example, major commercial airlines have to submit their aircraft maintenance records to the FAA. The authorized mechanic must sign electronic records that can be processed by the FAA. The solution should implement an industryrecognized digital signature standard that can be independently verified by an external party. In addition, the solution should be able to transmit the data so that the trading partner can process it once E-Sign Transactions Platform Page 9

10 the signature is verified. Many industry associations, such as Mortgage Industry Standards Maintenance Organization (MISMO) have identified the W3C XML-Dsig as the standard for signing documents. COMPARISON OF APPROACHES Having established the criteria for comparison the two architectures can now be evaluated. Figure 5 is a summary comparison of the two approaches based on the ability to complete automation of business processes. Risk Mitigation Independent of Business Applications The Document-centric approach is limited in its ability to manage risk as it is based on a specific presentation application. This forces the business application to be enhanced to mitigate the transaction risk. In contrast the transaction centric architecture can enforce business rules independent of applications because the transaction data semantics are understood. Preserve Integrity While Data is Augmented There is a significant difference in the design philosophy of the two approaches when it comes to preserving integrity. The document-centric approach focuses on cryptographically encrypting the document as a whole rather than the data. It is impossible to maintain integrity of data once the data has been striped from the document. In contrast, the individual data elements are being cryptographically sealed in the transaction-centric approach. This enables addition of new data without invalidating the electronic signature computed on previous data items. Also, if a data field that was not signed previously was modified, this data can be later signed without invalidating the signature. Data Field Level Privacy The transaction-centric architecture enables data field level encryption and decryption offering field level access control. The document-centric architecture cannot offer this choice. Regulatory and Legislative Compliance Both architectures have to be compliant with the regulatory and legal requirements to enable migration of paper-based authorizations to the digital world. Single Framework Supporting Multiple Presentation Formats A transaction-centric model's primary design goal is to enable multiple presentation formats by separating presentation from data. A document-centric approach is built for a specific format and does not meet this requirement. Figure 5 Comparison of Transaction-Centric and Document-Centric Architectures REQUIREMENT Risk Mitigation Independent of Business Applications Preserve Integrity while Data is Augmented Data-Field Level Privacy Regulatory and Legislative Compliance Single Framework Supporting Multiple Presentation Formats Content-Based Rules End-to-End Integration Trusted Exchange Between Enterprises TRANSACTION DOCUMENT E-Sign Transactions Platform Page 10

11 Content-Based Rules The very nature of understanding transaction data enables content-based rule definition and enforcement. On the other hand, in the document-centric approach data and presentation are bundled together, making it difficult to identify content-based rules. End-to-End Integration The document-centric approach is built for proprietary presentation technologies such as MS/Word or Adobe/PDF. As a result, it cannot be easily integrated with disparate IT systems throughout the enterprise or with external partners. The transaction-processing model is based on understanding data semantics and separating presentation from data. Data integration is easy with the transaction-centric model. Trusted Data Exchange between enterprises The document-centric approach necessitates separating data from the document for data processing. Given the design it is impossible to maintain the integrity of data once the data has been stripped from the document. The design philosophy of the transaction-centric approach is to separate data and presentation, facilitating data processing after signatures have been validated. CONCLUSION Enterprises can address the challenges of Complete Business Process Automation, by digitizing the pape-based signature process. Meeting business requirements to digitize paper based signature processes, requires enterprises to: (1) provide a comprehensive transaction security framework, (2) be compliant with legislative and regulatory guidelines and (3) be able to meet the enterprise Intelligence needs.the ideal architecture consists of the three integrated Trusted Transaction engines described in this paper. The transaction-centric architecture allows presentation and processing flexibility because the architecture is based on the separation of data and presentation. In addition, it enables enterprise business policy enforcement without impacting the business applications. The transaction-centric architecture is a flexible architecture that scales from departmental solutions to enterprise implementations while satisfying the security, compliance, and intelligence needs of different transaction classes. The document centric architecture is not scalable for enterprise solutions and is appropriate only for departmental systems implementing a point solution. Figure 6 Transaction-Centric Architecture meets enterprise Requirements DOCUMENT CENTRIC TRANSACTION CENTRIC COMPLIANT Data Presentation Edit Rules COMPLIANT Risk Mitigation Independent of Applications Preserve Integrity while Data is Augmented Date Field Level Privacy Single Framework Supporting Multiple Presentation Formats Content-based Rules End-to-End Integration Dulles Technology Drive Suite 200 Herndon, Virginia 20171, US Exostar. All rights reserved E-Sign Transactions Platform Page 11

Automating High-Value Agreements Complete the transition to paperless processes

Automating High-Value Agreements Complete the transition to paperless processes Complete the transition to paperless processes August 2007 W H I T E P A P E R Introduction Business agreements are the lifeblood of any enterprise. Companies must execute a multitude of transactions with

More information

Business Issues in the implementation of Digital signatures

Business Issues in the implementation of Digital signatures Business Issues in the implementation of Digital signatures Much has been said about e-commerce, the growth of e-business and its advantages. The statistics are overwhelming and the advantages are so enormous

More information

Why Use Electronic Transactions Instead of Paper? Electronic Signatures, Identity Credentialing, Digital Timestamps and Content Authentication

Why Use Electronic Transactions Instead of Paper? Electronic Signatures, Identity Credentialing, Digital Timestamps and Content Authentication Why Use Electronic Transactions Instead of Paper? Electronic Signatures, Identity Credentialing, Digital Timestamps and Content Authentication Introduction By allowing the exchange of information more

More information

AlphaTrust PRONTO Enterprise Platform Product Overview

AlphaTrust PRONTO Enterprise Platform Product Overview AlphaTrust PRONTO Enterprise Platform Product Overview AlphaTrust PRONTO Enterprise Platform is server-based software that automates the creation of legally enforceable, permanent business records that

More information

Electronic Signature: Increasing the Speed and Efficiency of Commercial Transactions

Electronic Signature: Increasing the Speed and Efficiency of Commercial Transactions Electronic Signature: Increasing the Speed and Efficiency of Commercial Transactions Signatures make the world go round. In other words, we need to commit and receive commitments from others in order make

More information

Arkansas Department of Information Systems Arkansas Department of Finance and Administration

Arkansas Department of Information Systems Arkansas Department of Finance and Administration Arkansas Department of Information Systems Arkansas Department of Finance and Administration Title: Electronic Signature Standard Document Number: SS 70 011 Effective Date: Act 722 of 2007 requires state

More information

Electronic Signature Article

Electronic Signature Article Electronic Signature Article ESIGN Electronic Commerce and Electronic Signature Law Clarified Copyright Topaz Systems Inc. All rights reserved. For Topaz Systems, Inc. trademarks and patents, visit www.topazsystems.com/legal.

More information

State of Arkansas Policy Statement on the Use of Electronic Signatures by State Agencies June 2008

State of Arkansas Policy Statement on the Use of Electronic Signatures by State Agencies June 2008 State of Arkansas Policy Statement on the Use of Electronic Signatures by State Agencies June 2008 Background In the last ten years Arkansas has enacted several laws to facilitate electronic transactions

More information

Electronic and Digital Signatures

Electronic and Digital Signatures Summary The advent of e-government and e-services has changed the way state agencies and local government offices do business. As a result, electronic systems and processes have become as important as

More information

5 FAM 140 ACCEPTABILITY AND USE OF ELECTRONIC SIGNATURES

5 FAM 140 ACCEPTABILITY AND USE OF ELECTRONIC SIGNATURES 5 FAM 140 ACCEPTABILITY AND USE OF ELECTRONIC SIGNATURES 5 FAM 141 PURPOSE (CT-IM-112; 07-30-2010) (Office of Origin: IRM/OPS/ITI/SI/IIB) The purpose of this FAM chapter is to enable the Department to

More information

ELECTRONIC PRESENTATION AND E-SIGNATURE FOR ELECTRONIC FORMS, DOCUMENTS AND BUSINESS RECORDS ALPHATRUST PRONTO ENTERPRISE PLATFORM

ELECTRONIC PRESENTATION AND E-SIGNATURE FOR ELECTRONIC FORMS, DOCUMENTS AND BUSINESS RECORDS ALPHATRUST PRONTO ENTERPRISE PLATFORM W H I T E P A P E R ELECTRONIC PRESENTATION AND E-SIGNATURE FOR ELECTRONIC FORMS, DOCUMENTS AND BUSINESS RECORDS ALPHATRUST PRONTO ENTERPRISE PLATFORM This white paper is written for senior executives,

More information

B2C Electronic Signatures Building Stronger Consumer Relationships Lewis D. Levey, President & CEO Computime, Inc.

B2C Electronic Signatures Building Stronger Consumer Relationships Lewis D. Levey, President & CEO Computime, Inc. B2C Electronic Signatures Building Stronger Consumer Relationships Lewis D. Levey, President & CEO Computime, Inc. Throughout my personal experience in the electronic signature industry, I have watched

More information

Automation for Electronic Forms, Documents and Business Records (NA)

Automation for Electronic Forms, Documents and Business Records (NA) Automation for Electronic Forms, Documents and Business Records (NA) White Paper Learn more. www.alphatrust.com Automation for Electronic Forms, Documents and Business Records (NA) White Paper About AlphaTrust

More information

Understanding Digital Signature And Public Key Infrastructure

Understanding Digital Signature And Public Key Infrastructure Understanding Digital Signature And Public Key Infrastructure Overview The use of networked personnel computers (PC s) in enterprise environments and on the Internet is rapidly approaching the point where

More information

Electronic Signatures: A New Opportunity for Growth. May 10, 2005

Electronic Signatures: A New Opportunity for Growth. May 10, 2005 Electronic Signatures: A New Opportunity for Growth May 10, 2005 1 Contents Is It Legal? 3 E-Signature Technology 12 Another Industry Example 15 National Association for Variable Annuities Applications

More information

CoSign for 21CFR Part 11 Compliance

CoSign for 21CFR Part 11 Compliance CoSign for 21CFR Part 11 Compliance 2 Electronic Signatures at Company XYZ Company XYZ operates in a regulated environment and is subject to compliance with numerous US government regulations governed

More information

10 Tips for Selecting the Best Digital Signature Solution

10 Tips for Selecting the Best Digital Signature Solution 10 Tips for Selecting the Best Digital Signature Solution Avoid the Pitfalls when transitioning from paper-based to electronic signatures Sept 2007 1 Introduction As the traditional paper-based world gives

More information

Understanding E-Signatures: A Beginner s Guide

Understanding E-Signatures: A Beginner s Guide Understanding E-Signatures: A Beginner s Guide Content Summary 1 Overview 2 Technology / Terminology Electronic signatures have seen significant adoption in the past decade within insurance, lending, government

More information

Digital Signatures in the Legal Market:

Digital Signatures in the Legal Market: The Digital Signature Company Digital Signatures in the Legal Market: How to Select the Right Solution for Your Firm or Legal Department Introduction A shift is taking place in the relationship between

More information

Electronic Signature Recordkeeping Guidelines

Electronic Signature Recordkeeping Guidelines Electronic Signature Recordkeeping Guidelines Summary E-government and e-services change the way state and local government agencies conduct business. In a paper environment, a hand signature, also known

More information

White Paper. The E-Sign Act. Use and enforceability of identifiers, passwords and personal identification numbers as signatures

White Paper. The E-Sign Act. Use and enforceability of identifiers, passwords and personal identification numbers as signatures White Paper The E-Sign Act Use and enforceability of identifiers, passwords and personal identification numbers as signatures 1 Table of Contents Introduction 2 The Audit Confirmation Process 2 The Confirm

More information

How To Choose An Electronic Signature

How To Choose An Electronic Signature Electronic Signature Systems A Guide for IT Personnel Copyright Topaz Systems Inc. All rights reserved. For Topaz Systems, Inc. trademarks and patents, visit www.topazsystems.com/legal. Table of Contents

More information

Moving Towards an Electronic Real Estate Transaction

Moving Towards an Electronic Real Estate Transaction Moving Towards an Electronic Real Estate Transaction The Electronic Signature Legal Overview (U.S.) August 2010 1 Introduction Every real estate transaction involves the parties to the transaction putting

More information

POLICY ISSUES IN E-COMMERCE APPLICATIONS: ELECTRONIC RECORD AND SIGNATURE COMPLIANCE. 15 USC 7001 et. seq. (E-SIGN) and

POLICY ISSUES IN E-COMMERCE APPLICATIONS: ELECTRONIC RECORD AND SIGNATURE COMPLIANCE. 15 USC 7001 et. seq. (E-SIGN) and W H I T E P A P E R POLICY ISSUES IN E-COMMERCE APPLICATIONS: ELECTRONIC RECORD AND SIGNATURE COMPLIANCE 15 USC 7001 et. seq. (E-SIGN) and Uniform Electronic Transactions Act (UETA) ALPHATRUST PRONTO ENTERPRISE

More information

Issues to Address: The Privacy Concerns of Individuals

Issues to Address: The Privacy Concerns of Individuals July 21, 2009 The Honorable Michael J. Astrue Commissioner Social Security Administration 6401 Security Boulevard Baltimore, MD 21235-7703 Dear Mike: As you requested, the ABA explored the issues related

More information

Secured Signing for Documents

Secured Signing for Documents Signing Documents in the Cloud Moving Local Government Forward ALGIM 2011 Annual Conference Mike Eyal TME Consulting Ltd, MD Current Signing Process Agenda Why Sign Documents Online? DS Solutions for Local

More information

ELECTRONIC SIGNATURES IN GLOBAL AND NATIONAL COMMERCE ACT

ELECTRONIC SIGNATURES IN GLOBAL AND NATIONAL COMMERCE ACT ELECTRONIC SIGNATURES IN GLOBAL AND NATIONAL COMMERCE ACT By John S. Stolz and John D. Cromie 2001 American Bar Association. Reprinted with permission On October 1, 2000, the United States took a substantial

More information

ELECTRONIC SIGNATURE REQUIREMENTS FOR LENDERS

ELECTRONIC SIGNATURE REQUIREMENTS FOR LENDERS ELECTRONIC SIGNATURE REQUIREMENTS FOR LENDERS June 2015 Purpose The Electronic Signatures in Global and National Commerce (ESIGN) Act (15 U.S.C. 7001-7006), enacted in 2000, permits, but does not require,

More information

Electronic And Digital Signatures

Electronic And Digital Signatures Electronic And Digital Signatures Summary The advent of e-government and e-services is changing the way we do business. Traditionally, we created records on paper and we authenticated a record by signing

More information

Digital Signatures The Silver Bullet for E-Signature Laws

Digital Signatures The Silver Bullet for E-Signature Laws Digital Signatures The Silver Bullet for E-Signature Laws Date: May, 2001 Version: 1.0 Copyright 2001-2003 Entrust. All rights reserved. Digital Signatures: The Silver Bullet for E-Signature Laws During

More information

w w w. e l o c k. c o m

w w w. e l o c k. c o m Adding value to digital signatures w w w. e l o c k. c o m In the world of global e-business, open, flexible, and innovative technologies are the keys to success. E-Lock Technologies has delivered the

More information

esign Online Digital Signature Service

esign Online Digital Signature Service esign Online Digital Signature Service Government of India Ministry of Communications and Information Technology Department of Electronics and Information Technology Controller of Certifying Authorities

More information

ELECTRONIC RECORD AND SIGNATURE COMPLIANCE. NASD Rules 3010(d) and 3110(c)(1)(C) SEC Rule 17a-4 15 USC 7001 et. seq. (E-SIGN)

ELECTRONIC RECORD AND SIGNATURE COMPLIANCE. NASD Rules 3010(d) and 3110(c)(1)(C) SEC Rule 17a-4 15 USC 7001 et. seq. (E-SIGN) C O M P L I A N C E G U I D E ELECTRONIC RECORD AND SIGNATURE COMPLIANCE NASD Rules 3010(d) and 3110(c)(1)(C) SEC Rule 17a-4 15 USC 7001 et. seq. (E-SIGN) ALPHATRUST PRONTO ENTERPRISE PLATFORM This compliance

More information

Electronic Signature Assurance & the Digital Chain-of-Evidence

Electronic Signature Assurance & the Digital Chain-of-Evidence Electronic Signature Assurance & the Digital Chain-of-Evidence Executing Legally Admissible Digitally Signed Records by Jacques R. Francoeur, B.A.Sc., M.A.Sc., MBA Table of Contents 1. Executive Summary

More information

White Paper Delivering Web Services Security: The Entrust Secure Transaction Platform

White Paper Delivering Web Services Security: The Entrust Secure Transaction Platform White Paper Delivering Web Services Security: September 2003 Copyright 2003 Entrust. All rights reserved. Entrust is a registered trademark of Entrust, Inc. in the United States and certain other countries.

More information

MANAGED FILE TRANSFER: 10 STEPS TO SOX COMPLIANCE

MANAGED FILE TRANSFER: 10 STEPS TO SOX COMPLIANCE WHITE PAPER MANAGED FILE TRANSFER: 10 STEPS TO SOX COMPLIANCE 1. OVERVIEW Do you want to design a file transfer process that is secure? Or one that is compliant? Of course, the answer is both. But it s

More information

Electronic Signature Approvals

Electronic Signature Approvals White Paper Electronic Signature Approvals Version 1.1 Last Updated: 20-09-2010 www.sutisoft.com 1 2 3 4 6 7 Abstract Introduction Need for Automation Finding a Suitable Solution SutiSign What is SaaS?

More information

Article. Robust Signature Capture Using SigPlus Software. Copyright Topaz Systems Inc. All rights reserved.

Article. Robust Signature Capture Using SigPlus Software. Copyright Topaz Systems Inc. All rights reserved. Article Robust Signature Capture Using SigPlus Software Copyright Topaz Systems Inc. All rights reserved. For Topaz Systems, Inc. trademarks and patents, visit www.topazsystems.com/legal. Table of Contents

More information

Concept of Electronic Approvals

Concept of Electronic Approvals E-Lock Technologies Contact info@elock.com Table of Contents 1 INTRODUCTION 3 2 WHAT ARE ELECTRONIC APPROVALS? 3 3 HOW DO INDIVIDUALS IDENTIFY THEMSELVES IN THE ELECTRONIC WORLD? 3 4 WHAT IS THE TECHNOLOGY

More information

POLICY ISSUES IN E-COMMERCE APPLICATIONS: ELECTRONIC RECORD AND SIGNATURE COMPLIANCE FDA 21 CFR 11 ALPHATRUST PRONTO ENTERPRISE PLATFORM

POLICY ISSUES IN E-COMMERCE APPLICATIONS: ELECTRONIC RECORD AND SIGNATURE COMPLIANCE FDA 21 CFR 11 ALPHATRUST PRONTO ENTERPRISE PLATFORM W H I T E P A P E R POLICY ISSUES IN E-COMMERCE APPLICATIONS: ELECTRONIC RECORD AND SIGNATURE COMPLIANCE FDA 21 CFR 11 ALPHATRUST PRONTO ENTERPRISE PLATFORM This white paper is written for senior executives

More information

Enterprise effectiveness of digital certificates: Are they ready for prime-time?

Enterprise effectiveness of digital certificates: Are they ready for prime-time? Enterprise effectiveness of digital certificates: Are they ready for prime-time? by Jim Peterson As published in (IN)SECURE Magazine issue 22 (September 2009). www.insecuremag.com www.insecuremag.com 1

More information

HOW IT WORKS E-SIGNLIVE 1 INTRODUCTION 2 OVERVIEW

HOW IT WORKS E-SIGNLIVE 1 INTRODUCTION 2 OVERVIEW HOW IT WORKS E-SIGNLIVE 1 INTRODUCTION With e-signlive, Silanis hosted service, you can invite other people to conveniently and securely sign documents over the web. Your documents can be easily signed

More information

LEGAL UPDATE October 14, 2008 Ashley Strauss-Martin, RANM Legal Hotline and Forms Attorney

LEGAL UPDATE October 14, 2008 Ashley Strauss-Martin, RANM Legal Hotline and Forms Attorney LEGAL UPDATE October 14, 2008 Ashley Strauss-Martin, RANM Legal Hotline and Forms Attorney Electronic Signatures The Uniform Electronic Transactions Act ( Act ) governs electronic signatures in New Mexico.

More information

Digital Signatures Best Practice for e-business Transactions

Digital Signatures Best Practice for e-business Transactions Digital Signatures Best Practice for e-business Transactions Copyright 2001-2003 Entrust. All rights reserved. Digital Signatures and e-business New business opportunities have emerged as paper-based

More information

The DoD Public Key Infrastructure And Public Key-Enabling Frequently Asked Questions

The DoD Public Key Infrastructure And Public Key-Enabling Frequently Asked Questions The DoD Public Key Infrastructure And Public Key-Enabling Frequently Asked Questions May 3, 2004 TABLE OF CONTENTS GENERAL PKI QUESTIONS... 1 1. What is PKI?...1 2. What functionality is provided by a

More information

GUIDE TO ENABLING E-GOVERNMENT:

GUIDE TO ENABLING E-GOVERNMENT: GUIDE TO ENABLING E-GOVERNMENT: SECURE E-FORMS AND DATA CAPTURE Date: 13 February 2002 Copyright 2003 Entrust. All rights reserved. Entrust is a registered trademark of Entrust, Inc. in the United States

More information

White Paper: Make Work Flow with E-Signature

White Paper: Make Work Flow with E-Signature White Paper: Make Work Flow with E-Signature An Efficient Technology Inc White Paper February 2011 White Paper: Make Work Flow with E-Signature TABLE OF CONTENTS FOREWORD... 3 INTRODUCTION... 3 ASSUMPTIONS...

More information

Adobe PDF for electronic records

Adobe PDF for electronic records White Paper Adobe PDF for electronic records Digital signatures and PDF combine for definitive electronic records and transactions Contents 1 PDF and electronic records 2 Digital certification 3 Validating

More information

Innovations in Digital Signature. Rethinking Digital Signatures

Innovations in Digital Signature. Rethinking Digital Signatures Innovations in Digital Signature Rethinking Digital Signatures Agenda 2 Rethinking the Digital Signature Benefits Implementation & cost issues A New Implementation Models Network-attached signature appliance

More information

Entrust Secure Web Portal Solution. Livio Merlo Security Consultant September 25th, 2003

Entrust Secure Web Portal Solution. Livio Merlo Security Consultant September 25th, 2003 Entrust Secure Web Portal Solution Livio Merlo Security Consultant September 25th, 2003 1 Entrust Secure Web Portal Solution Only the Entrust Secure Web Portal solution provides Security Services coupled

More information

Security in Fax: Minimizing Breaches and Compliance Risks

Security in Fax: Minimizing Breaches and Compliance Risks Security in Fax: Minimizing Breaches and Compliance Risks Maintaining regulatory compliance is a major business issue facing organizations around the world. The need to secure, track and store information

More information

The Impact of 21 CFR Part 11 on Product Development

The Impact of 21 CFR Part 11 on Product Development The Impact of 21 CFR Part 11 on Product Development Product development has become an increasingly critical factor in highly-regulated life sciences industries. Biotechnology, medical device, and pharmaceutical

More information

Security Digital Certificate Manager

Security Digital Certificate Manager System i Security Digital Certificate Manager Version 5 Release 4 System i Security Digital Certificate Manager Version 5 Release 4 Note Before using this information and the product it supports, be sure

More information

Security Digital Certificate Manager

Security Digital Certificate Manager IBM i Security Digital Certificate Manager 7.1 IBM i Security Digital Certificate Manager 7.1 Note Before using this information and the product it supports, be sure to read the information in Notices,

More information

E-Signature Adoption Trends

E-Signature Adoption Trends E-Signature Adoption Trends In Financial Services Michael Laurie, VP Product Strategy & Co-Founder March 14, 2013 Fast Facts 4 of the top 10 banks in North America More than 600,000,000 documents annually.

More information

Compliance in the Corporate World

Compliance in the Corporate World Compliance in the Corporate World How Fax Server Technology Minimizes Compliance Risks Fax and Document Distribution Group November 2009 Abstract Maintaining regulatory compliance is a major business issue

More information

Department of Veterans Affairs VA DIRECTIVE 6510 VA IDENTITY AND ACCESS MANAGEMENT

Department of Veterans Affairs VA DIRECTIVE 6510 VA IDENTITY AND ACCESS MANAGEMENT Department of Veterans Affairs VA DIRECTIVE 6510 Washington, DC 20420 Transmittal Sheet VA IDENTITY AND ACCESS MANAGEMENT 1. REASON FOR ISSUE: This Directive defines the policy and responsibilities to

More information

A Websense Research Brief Prevent Data Loss and Comply with Payment Card Industry Data Security Standards

A Websense Research Brief Prevent Data Loss and Comply with Payment Card Industry Data Security Standards A Websense Research Brief Prevent Loss and Comply with Payment Card Industry Security Standards Prevent Loss and Comply with Payment Card Industry Security Standards Standards for Credit Card Security

More information

Electronic approvals for forms FAQs

Electronic approvals for forms FAQs Click on any of the boxes below to explore more detail, including answers to frequently asked questions, video quick links, and more. Advisor experience Client experience Security Electronic approvals

More information

On-line Paperless Insurance Applications

On-line Paperless Insurance Applications B u s i n e s s B r i e f On-line Paperless Insurance Applications by Jothy Rosenberg, CTO & Co-founder The Insurance industry s need for on-line paperless applications is great. Successfully deploying

More information

SSLPost Electronic Document Signing

SSLPost Electronic Document Signing SSLPost Electronic Document Signing Overview What is a Qualifying Advanced Electronic Signature (QAES)? A Qualifying Advanced Electronic Signature, is a specific type of digital electronic signature, that

More information

SIGNATURES ON THE WEBÕS DOTTED LINE: ELECTRONIC SIGNATURES ON CREDIT APPLICATIONS AND GUARANTEES SOON VALID IN ALL STATES.

SIGNATURES ON THE WEBÕS DOTTED LINE: ELECTRONIC SIGNATURES ON CREDIT APPLICATIONS AND GUARANTEES SOON VALID IN ALL STATES. THE ELECTRONIC CREDIT DEPARTMENT SIGNATURES ON THE WEBÕS DOTTED LINE: ELECTRONIC SIGNATURES ON CREDIT APPLICATIONS AND GUARANTEES SOON VALID IN ALL STATES Scott Blakeley 1 The Internet is revolutionizing

More information

Electronic Signature, Attestation, and Authorship

Electronic Signature, Attestation, and Authorship Electronic Signature, Attestation, and Authorship Appendix C: Electronic Signature Model Policy This template document is not intended for adoption as a substitute for a customized organizational policy

More information

Michigan Criminal Justice Information Network (MiCJIN) State of Michigan Department of Information Technology & Michigan State Police

Michigan Criminal Justice Information Network (MiCJIN) State of Michigan Department of Information Technology & Michigan State Police Michigan Criminal Justice Information Network (MiCJIN) State of Michigan Department of Information Technology & Michigan State Police NASCIO 2006 Recognition Awards Enterprise Architecture Category Executive

More information

Glossary of Key Terms

Glossary of Key Terms and s Branch Glossary of Key Terms The terms and definitions listed in this glossary are used throughout the s Package to define key terms in the context of. Access Control Access The processes by which

More information

Securing your Online Data Transfer with SSL

Securing your Online Data Transfer with SSL Securing your Online Data Transfer with SSL A GUIDE TO UNDERSTANDING SSL CERTIFICATES, how they operate and their application 1. Overview 2. What is SSL? 3. How to tell if a Website is Secure 4. What does

More information

Meeting the FDA s Requirements for Electronic Records and Electronic Signatures (21 CFR Part 11)

Meeting the FDA s Requirements for Electronic Records and Electronic Signatures (21 CFR Part 11) Meeting the FDA s Requirements for Electronic Records and Electronic Signatures (21 CFR Part 11) Executive Summary...3 Background...4 Internet Growth in the Pharmaceutical Industries...4 The Need for Security...4

More information

Chap. 1: Introduction

Chap. 1: Introduction Chap. 1: Introduction Introduction Services, Mechanisms, and Attacks The OSI Security Architecture Cryptography 1 1 Introduction Computer Security the generic name for the collection of tools designed

More information

New York State Electronic Signatures and Records Act

New York State Electronic Signatures and Records Act PIANY Doc. No. 31174 New York State Electronic Signatures and Records Act The information contained within this Resource kit was made available by the New York State Department of State Division of Administrative

More information

AppRiver Secure E-Signature

AppRiver Secure E-Signature The AppRiver secure e-signature feature is the first truly secure way to easily and quickly sign and exchange digitally approved documents without relying on complex deployments. Electronic-signature functionality

More information

Entrust Managed Services PKI. Getting started with digital certificates and Entrust Managed Services PKI. Document issue: 1.0

Entrust Managed Services PKI. Getting started with digital certificates and Entrust Managed Services PKI. Document issue: 1.0 Entrust Managed Services PKI Getting started with digital certificates and Entrust Managed Services PKI Document issue: 1.0 Date of issue: May 2009 Copyright 2009 Entrust. All rights reserved. Entrust

More information

PKI Adoption Case Study (for the OASIS PKIA TC) ClinPhone Complies with FDA Regulations Using PKIbased Digital Signatures

PKI Adoption Case Study (for the OASIS PKIA TC) ClinPhone Complies with FDA Regulations Using PKIbased Digital Signatures PKI Adoption Case Study (for the OASIS PKIA TC) ClinPhone Complies with FDA Regulations Using PKIbased Digital Signatures PKI Project Title Digital Signatures for ClinPhone Organisation concerned ClinPhone

More information

Securing your Online Data Transfer with SSL A GUIDE TO UNDERSTANDING SSL CERTIFICATES, how they operate and their application INDEX 1. Overview 2. What is SSL? 3. How to tell if a Website is Secure 4.

More information

Document process management solutions for MiFID compliance

Document process management solutions for MiFID compliance Adobe Technical White Paper produced in conjunction with Equiduct Document process management solutions for MiFID compliance Adobe technology provides document process management solutions, enabling investment

More information

Product Lifecycle Management in the Medical Device Industry. An Oracle White Paper Updated January 2008

Product Lifecycle Management in the Medical Device Industry. An Oracle White Paper Updated January 2008 Product Lifecycle Management in the Medical Device Industry An Oracle White Paper Updated January 2008 Product Lifecycle Management in the Medical Device Industry PLM technology ensures FDA compliance

More information

OLEY VALLEY SCHOOL DISTRICT

OLEY VALLEY SCHOOL DISTRICT No. 829 SECTION: OPERATIONS OLEY VALLEY SCHOOL DISTRICT TITLE: ELECTRONIC SIGNATURES ADOPTED: February 19, 2015 REVISED: 829. ELECTRONIC TRANSACTIONS, RECORDS AND SIGNATURES 1. Purpose 2. Authority 73

More information

Oracle Identity Management for SAP in Heterogeneous IT Environments. An Oracle White Paper January 2007

Oracle Identity Management for SAP in Heterogeneous IT Environments. An Oracle White Paper January 2007 Oracle Identity Management for SAP in Heterogeneous IT Environments An Oracle White Paper January 2007 Oracle Identity Management for SAP in Heterogeneous IT Environments Executive Overview... 3 Introduction...

More information

White paper. Implications of digital certificates on trusted e-business.

White paper. Implications of digital certificates on trusted e-business. White paper Implications of digital certificates on trusted e-business. Abstract: To remain ahead of e-business competition, companies must first transform traditional business processes using security

More information

Vendor Questions. esignatures Request for information InsureSign

Vendor Questions. esignatures Request for information InsureSign InsureSign Vendor Questions 1. Legal Compliance Questionnaire This section corresponds to legal requirements as outlined in the CSIO esignatures Advisory Report prepared by Fasken Martineau LLP. 1. Signing

More information

Michigan Criminal Justice Information Network (MiCJIN) State of Michigan Department of Information Technology & Michigan State Police

Michigan Criminal Justice Information Network (MiCJIN) State of Michigan Department of Information Technology & Michigan State Police Michigan Criminal Justice Information Network (MiCJIN) State of Michigan Department of Information Technology & Michigan State Police NASCIO 2005 Recognition Awards Enterprise Architecture Category Executive

More information

esignature Requirements Gathering Silanis Technology Inc., 2006 Silanis grants to BFMA the right to use and distribute this material.

esignature Requirements Gathering Silanis Technology Inc., 2006 Silanis grants to BFMA the right to use and distribute this material. SILANIS TECHNOLOGY INC. Tommy Petrogiannis President esignature Requirements Gathering Silanis Technology Inc., 2006 Silanis grants to BFMA the right to use and distribute this material. Symposium 06 Speaker

More information

Subject: Public Key Infrastructure: Examples of Risks and Internal Control Objectives Associated with Certification Authorities

Subject: Public Key Infrastructure: Examples of Risks and Internal Control Objectives Associated with Certification Authorities United States Government Accountability Office Washington, DC 20548 August 10, 2004 The Honorable Tom Davis Chairman, Committee on Government Reform House of Representatives Dear Mr. Chairman: Subject:

More information

Supporting FISMA and NIST SP 800-53 with Secure Managed File Transfer

Supporting FISMA and NIST SP 800-53 with Secure Managed File Transfer IPSWITCH FILE TRANSFER WHITE PAPER Supporting FISMA and NIST SP 800-53 with Secure Managed File Transfer www.ipswitchft.com Adherence to United States government security standards can be complex to plan

More information

Public Key Infrastructure. A Brief Overview by Tim Sigmon

Public Key Infrastructure. A Brief Overview by Tim Sigmon Public Key Infrastructure A Brief Overview by Tim Sigmon May, 2000 Fundamental Security Requirements (all addressed by PKI) X Authentication - verify identity of communicating parties X Access Control

More information

Direct Secure Messaging: Improving the Secure and Interoperable Exchange of Health Information

Direct Secure Messaging: Improving the Secure and Interoperable Exchange of Health Information Direct Secure Messaging: Improving the Secure and Interoperable Exchange of Health Information Within the healthcare industry, the exchange of protected health information (PHI) is governed by regulations

More information

Document Management Getting Started Guide

Document Management Getting Started Guide Document Management Getting Started Guide Version: 6.6.x Written by: Product Documentation, R&D Date: February 2011 ImageNow and CaptureNow are registered trademarks of Perceptive Software, Inc. All other

More information

Autonomy LiquidOffice- Key Solution Elements

Autonomy LiquidOffice- Key Solution Elements Autonomy LiquidOffice- Key Solution Elements Electronic Forms Rapidly migrate to a rich online eforms experience LiquidOffice provides the complete infrastructure needed to put form and document processes

More information

CHAPTER 1 INTRODUCTION

CHAPTER 1 INTRODUCTION 1 CHAPTER 1 INTRODUCTION 1.1 Introduction Letter is a written message from a person to another person in other meaning for communication between two people in another location. In an organization, letter

More information

SECURE DIGITAL SIGNATURES FOR APPRAISERS

SECURE DIGITAL SIGNATURES FOR APPRAISERS ABSTRACT An appraiser s credibility is represented by a valid license and the signature affixed to a report. Providing a common requirement for the creation of digital signatures for licensed or certified

More information

Demystifying Digital Signature Usage for Global Business

Demystifying Digital Signature Usage for Global Business WHITE PAPER Demystifying Digital Signature Usage for Global Business Summary There are many applications of electronic signature spanning from simple consumer click to agree to multipart business contract

More information

Solving data residency and privacy compliance challenges Delivering business agility, regulatory compliance and risk reduction

Solving data residency and privacy compliance challenges Delivering business agility, regulatory compliance and risk reduction Solving data residency and privacy compliance challenges Delivering business agility, regulatory compliance and risk reduction Introduction In today s dynamic business environment, corporation s intangible

More information

The biggest challenges of Life Sciences companies today. Comply or Perish: Maintaining 21 CFR Part 11 Compliance

The biggest challenges of Life Sciences companies today. Comply or Perish: Maintaining 21 CFR Part 11 Compliance S E P T E M B E R 2 0 1 3 Comply or Perish: The biggest challenges of Life Sciences companies today are maintaining a robust product pipeline and reducing time to market while complying with an increasing

More information

CRS Report for Congress Received through the CRS Web

CRS Report for Congress Received through the CRS Web Order Code RS20344 Updated January 19, 2001 CRS Report for Congress Received through the CRS Web Summary Electronic Signatures: Technology Developments and Legislative Issues Richard M. Nunno Analyst in

More information

Digital Signatures The Law and Best Practices for Compliance. January 2014

Digital Signatures The Law and Best Practices for Compliance. January 2014 Digital Signatures The Law and Best Practices for Compliance January 2014 Electronic/Digital Signature Legislation Disclaimer: ARX is not is not a law firm and does not provide legal advice. We make no

More information

Signing and Sealing Implementation Update

Signing and Sealing Implementation Update Signing and Sealing Implementation Update Digital Signatures / Digital Certificates / Seals What are they? How do they work? Can we use Digital Signatures instead of Wet Signatures? Are they legally binding?

More information

Digital Signatures: The Digital Signature Company. Best Practices for State and Local Government

Digital Signatures: The Digital Signature Company. Best Practices for State and Local Government Digital Signatures: Best Practices for State and Local Government Introduction State and local governmental organizations have come under increasing pressure over the past few years to streamline processes

More information

e-signlive for LotusLive Silanis Online e-signature Services e-signdoc User Guide Connect. Collaborate. Close.

e-signlive for LotusLive Silanis Online e-signature Services e-signdoc User Guide Connect. Collaborate. Close. Silanis Online e-signature Services e-signdoc Connect. Collaborate. Close. April 13, 2010 Information in this document is subject to change without notice, and does not represent a commitment on the part

More information

Electronic forms. White Paper

Electronic forms. White Paper White Paper Electronic forms Table of contents 1 The business of forms 3 Advantages of PDF forms 4 Form requirements across sectors 5 Forms technologies and formats 7 Summary Organizations use business

More information

Understanding Enterprise Cloud Governance

Understanding Enterprise Cloud Governance Understanding Enterprise Cloud Governance Maintaining control while delivering the agility of cloud computing Most large enterprises have a hybrid or multi-cloud environment comprised of a combination

More information

U-LINC : Workflow and Notifications Anytime and Anywhere for Microsoft Dynamics GP

U-LINC : Workflow and Notifications Anytime and Anywhere for Microsoft Dynamics GP U-LINC : Workflow and Notifications Anytime and Anywhere for Microsoft Dynamics GP An Integrity Data White Paper U-LINC has given us the ability to quickly and easily implement workflow solutions into

More information